Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Threat Intelligence Services Spending to Top $1.4 Billion by 2018: IDC

According to new research from International Data Corporation (IDC), worldwide threat intelligence security services spending will increase from $905.5 million in 2014 to more than $1.4 billion in 2018.

According to new research from International Data Corporation (IDC), worldwide threat intelligence security services spending will increase from $905.5 million in 2014 to more than $1.4 billion in 2018.

“A consistent bombardment of unknown, targeted, and adaptive cyber threats are wreaking havoc in the enterprise and driving the expansion of threat intelligence security services (TISS) that are specifically designed to detect advanced persistent threats (APTs), advanced malware, and previously unidentified attacks,” IDC said as it released its most recent threat intelligence spending report.

According to IDC’s research threat intelligence security consulting services made up roughly 22% of entire threat intelligence security services market revenue in 2013.

IDC explained that the overall TISS market is made up of several components and services, including data feeds and publications, consulting security services, and managed security services (MSS).

Related ReadingShaping the Threat Intelligence Management Market 

Additional findings from IDC’s forecast include:

Advertisement. Scroll to continue reading.

• Iterative intelligence must be available to small and medium-sized businesses as they see increased attacks like wire fraud and intellectual property theft.

• Both professional and managed security services will continue to experience strong growth in the threat intelligence arena.

• TISS offers customers deeper insights into global threat environments than they could achieve themselves.

• Security services firms are creating alliances with universities and accreditation programs to find and develop security personnel.

IDC also said that it has expanded its definition of the intelligence security services market to include what it calls iterative intelligence.

“This iterative process learns from past experiences and mistakes, and incorporates this new knowledge at a more rapid pace, which often results in better long-term solutions,” the research firm said.

“Threat intelligence is essentially a community activity,” said Christina Richmond, Program Director, Security Services at IDC. “Attack information can come from many different sources, and iterative intelligence organizes this chaotic process of information sharing in order to help organizations in making future decisions.”

“Organizations need customizable threat intelligence that can be immediately used within their network environments to prevent cyberattacks from occurring,” Internet security firm Check Point Software Technologies explained in a recent announcement of its new intelligence marketplace earlier this month. “Today however, sources for threat intelligence are fragmented, and offered by numerous vendors for specific countries and verticals.”

The full report, priced at a hefty $4,500, is available directly from IDC.

Related Reading: Shaping the Threat Intelligence Management Market 

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.